Noordwijkerhout

 5th international workshop on information hiding

 

 

call for papers
registration
travel information
program
accepted papers
past workshops
next workshop
photos

 

 

program of the workshop

 

Sunday 6 October 2002
 

18:00 - 19:00 Registration

 

Monday 7 October 2002
 

09:00 - 10:00 Session 1 – Information hiding and networking
Session chair: Neil Johnson (Booz-Allen and Hamilton)
 
#140 - Hiding Intrusions: From the abnormal to the normal and beyond
Kymie Tan (Carnegie Mellon University), John McHugh (CERT Coordination Center), Kevin Killourhy (Carnegie Mellon University)
 
#155 - Eliminating Steganography in Internet Traffic with Active Wardens
Gina Fisk (Los Alamos National Laboratory), Mike Fisk (Los Alamos National Laboratory), Christos Papadopoulos (University of Southern California), Joshua Neil (Los Alamos National Laboratory)
10:00 - 10:30 Coffee break
10:30 - 12:00 Session 2 – Anonymity
Session chair: Andreas Pfitzmann (Dresden University of Technology)
 
#186 - From a Trickle to a Flood: Active Attacks on Several Mix Types
Andrei Serjantov (University of Cambridge), Roger Dingledine (The Free Haven Project), Paul Syverson (Naval Research Laboratory)
 
#189 - Limits of Anonymity in Open Environments
Dogan Kesdogan (RWTH Aachen), Dakshi Agrawal (IBM T. J. Watson Research Centre), Stefan Penz (RWTH Aachen)
 
#137 - Chaffinch: Confidentiality in the Face of Legal Threats
Richard Clayton (University of Cambridge), George Danezis (University of Cambridge)
12:00 - 13:30 Lunch
13:30 - 15:00 Session 3 – Watermarking fundamentals
Session chair: Job Oostveen (Philips Research)
 
#130 - Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation
Felix Balado (University of Vigo), Fernando Pérez-González (University of Vigo)
 
#191 - Robustness and Efficiency of Non-Linear Side-Informed Watermarking
Guénolé Silvestre (University College Dublin), Neil Hurley (University College Dublin), Teddy Furon (IRISA)
 
#147 - Security of Public Watermarking Schemes for Binary Sequences
Qiming Li (National University of Singapore), Ee-Chien Chang (National University of Singapore)
15:00 - 15:30 Coffee break
15:30 - 17:00 Session 4 – Watermarking algorithms I
Session chair: Hyoung Joong Kim (Kangwon National University)
 
#125 - Direct Embedding and Detection of RST Invariant Watermarks
Kieran Larkin (Canon Information Systems Research Australia), Peter Fletcher (Canon Information Systems Research Australia)
 
#176 - Rotation, scale, and translation invariant watermark using bispectrum invariants
Hyung Shin Kim (KAIST), Yunju Baek (KAIST), Heung-Kyu Lee (KAIST), Young-Ho Suh (ETRI)
 
#195 - Audio Watermark Robustness to Desynchronization via Beat Detection
Darko Kirovski (Microsoft Research), Hagai Attias (Microsoft Research)
15:00 - 16:00 Rump session

 

Tuesday 8 October 2002
 

09:00 - 10:00 Session 5 – Watermarking algorithms II
Session chair: Ton Kalker (Philips Research)
 
#179 - Robust Watermarking and Affine Registration of 3D Meshes
Oliver Benedens (Fraunhofer Institute for Computer Graphics)
 
#152 - Natural Language Watermarking and Tamperproofing
Mikhail Atallah (Purdue University), Victor Raskin (Purdue University), Christian F. Hempelmann (Purdue University), Mercan Karahan (Purdue University), Radu Sion (Computer Sciences, Purdue University), Umut Topkara (Purdue University), Katrina E. Triezenberg (Purdue University)
10:00 - 10:30 Coffee break
10:30 - 12:00 Session 6 – Attacks on watermarking algorithms
Session chair: Fabien A. P. Petitcolas (Microsoft Research)
 
#154 - Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
Tri Le-Van (Florida State University), Yvo Desmedt (Florida State University)
 
#180 - Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
M. Kivanç Mihçak (Microsoft Research), Ramarathnam Venkatesan (Microsoft Research), Mustafa Kesal (University of Illinois, Urbana-Champaign)
 
#196 - Detectors for Echo Hiding Systems
Scott Craver (Princeton University), Bede Liu (Princeton University), Wayne Wolf (Princeton University)
12:00 - 13:30 Lunch
13:30 - 15:00 Session 7 – Steganography algorithms
Session chair: Jessica Fridrich (SUNY Binghamton)
 
#141 - A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
Richard Newman (University of Florida), Ira Moskowitz (Naval Research Laboratory), LiWu Chang (US), Murali Brahmadesam (University of Florida)
 
#143 - Steganography Preserving Statistical Properties
Elke Franz (Dresden University of Technology)
 
#112 - Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression
Hideki Noda (Kyushu Institute of Technology), Jeremiah Spaulding (Kyushu Institute of Technology), Mahdad N. Shirazi (Communications Research Laboratory), Michiharu Niimi (Kyushu Institute of Technology), Eiji Kawaguchi (Kyushu Institute of Technology)
10:00 - 15:30 Coffee break
15:30 - 16:30 Session 8 – Steganalysis I
Session chair: Richard Clayton (University of Cambridge)
 
#134 - Steganalysis of JPEG Images: Breaking the F5 Algorithm
Jessica Fridrich (SUNY Binghamton), Miroslav Goljan (SUNY Binghamton), Dorin Hogea (SUNY Binghamton)
 
#120 - Detecting Low Embedding Rates
Andreas Westfeld (TU Dresden)
16:30 - 17:00
Invited talk
Secret-Ballot Receipts and Transparent Integrity
David Chaum
17:30 - 22:30 Conference dinner

 

Wednesday 9 October 2002
 

09:00 - 10:00 Session 9 – Steganalysis II
Session chair: John McHugh (SEI/CERT)
 
#133 - Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
Siwei Lyu (Dartmouth College), Hany Farid (Dartmouth College)
 
#158 - Detection of LSB Steganography via Sample Pair Analysis
Sorina Dumitrescu (McMaster University), Xiaolin Wu (McMaster University), Zhe Wang (McMaster University)
10:00 - 10:30 Coffee break
10:30 - 11:30 Session 10 – Hiding information in unusual content I
Session chair: Christian S. Collberg (University of Arizona)
 
#194 - Hiding Data in DNA
Boris Shimanovsky (XAP Corporation), Jessica Feng (UCLA), Miodrag Potkonjak (UCLA)
 
#116 - Tracing the Source of a Shredded Document
Jack Brassil (HP Laboratories)
11:30 - 13:00 Lunch
13:00 - 14:00 Session 11 – Hiding information in unusual content II
Session chair: Caroline Fontaine (Université des Sciences et Technologies de Lille)
 
#124 - Oblivious Hashing: Silent Verification of Code Execution
Yuqun Chen (Microsoft Research), Ramarathnam Venkatesan (Microsoft Research), Matthew Cary (University of Washington), Ruoming Pang (Princeton University), Saurabh Sinha (University of Washington), Mariusz Jakubowski (Microsoft Research)
 
#132 - Practical Oblivious Transfer Protocols
Christian Tobias (University of Frankfurt)
14:00 Closing remarks
Call for proposals for the next workshop

 

 

Saturday, 23 November 2002 04:13 -0000